• Title/Summary/Keyword: 전자카드

Search Result 563, Processing Time 0.03 seconds

Symmetry structured SPN block cipher algorithm (대칭구조 SPN 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Cho, Gyeong-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1093-1100
    • /
    • 2008
  • Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

  • PDF

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Active Authentication Method using NFC (NFC를 활용한 능동형 인증 방법)

  • Lee, Min-Gu;Kim, Dong-Wan;Sohn, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.140-156
    • /
    • 2012
  • Since most of recently launched smart devices support NFC(Near Field Communication), RFID applications are tend to be replaced. For instance, previous RFID application areas such as entrance control, mobile e-ticket, electronic payment and et. al are subject to change using NFC. Due to the limitation of passive communication in RFID, it is impossible to cover all security requirements of authentication and authorization mechanism that wide areas of applications demand. Therefore authentication and authorization mechanism based on NFC is very attractive to such applications because active communication methods make it possible to be highly secure in authentication and authorization. In this paper, authors propose a new approach of secure authentication and authorization mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.

Research on Consumer Protection of Carrier Billing Services (통신과금서비스 소비자 보호 방안 연구)

  • Yoo, Soon-Duck;Kim, Jong-Ihl
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • Carrier billing services market is growing according to the technical development. This study investigated the limiting factor in carrier billing services and suggested the improvement factor for it using the Delphi Method. The amount money to use in carrier billing charges should be provided in their credit based and the accumulated payment using a text message is displayed and also telecommunications carriers and carrier billing firms are the least responsible for consumer harm. It also provides administrative responsibility for communications carriers and billing services company for non recognition and payment. The service provider to prove negligence not proven by consumer and telecommunications billing service delinquency rate is applied at a rate such as a credit card and it also should integrate retail payment and service fee. This study will contribute to the communication billing services market growth through improved communication billing service. Further research is needed to continue the study of the factors that emerged from communication and billing services due to emerging technologies and services.

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Chemical Properties of Slow-Released Nitrogen Fertilizer Using Waste Paper Slurry (폐지섬유를 이용한 완효성 요소비료의 특성)

  • Kim, Bok-Jin;Back, Jun-Ho;Lee, Byung-Guen
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.33 no.2
    • /
    • pp.109-113
    • /
    • 2000
  • The purpose of this study was conducted to develop the slow-released N fertilizer(SRNF) using of waste paper cellulose. Properties of trial product was investigated. Contents of nitrogen, phosphorus, and potassium in trial product were showed 26%, 0.04 and 0.01%, respectively. The contents of Cr, Cu, Pb and Zn were showed 17.4ppm. 259ppm, 12.2ppm and 60.0ppm in the trial product, respectively. However, As and Cd was not detected. Nitrogen of SRNF could be released 60.4% within 12hr after dissolution in water. However, the releasing velocity was thereafter remarkably delayed, showing 75% after dissolution for 72hr.

  • PDF

Fault Detection through the LASAR Component modeling of PLD Devices (PLD 소자의 LASAR 부품 모델링을 통한 고장 검출)

  • Pyo, Dae-in;Hong, Seung-beom
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.4
    • /
    • pp.314-321
    • /
    • 2020
  • Logic automated stimulus and response (LASAR) software is an automatic test program development tool for logic function test and fault detection of avionics components digital circuit cards. LASAR software needs to the information for the logic circuit function and input and output of the device. If there is no component information, normal component modeling is impossible. In this paper, component modeling is carried out through reverse design of programmable logic device (PLD) device without element information. The developed LASAR program identified failure detection rates through fault simulation results and single-seated fault insertion methods. Fault detection rates have risen by 3% to 91% for existing limited modeling and 94% for modeling through the reverse design. Also, the 22 case of stuck fault with the I/O pin of EP310 PLD were detected 100% to confirm the good performance.

A Multi-point I/O module development that utilize PC's LAN card and Switching (PC의 랜카드와 스위칭 허브를 활용한 다접점 I/O 모듈 개발)

  • Kim, Tae-Min;Jeon, Yoon-Han;Shin, Gun-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2022-2030
    • /
    • 2008
  • System such as FA and breakup TC is applied by real time and need to manage. This paper studies data processing skill that can divide TC and data of much quantity with collection by real time. Modularize to several system, and use of computer communication network that interlink computers that can achieve control function of each systems to network is spreading. Develop that can take advantage of Ideonet communication method and transmit signal of channel because do multiplex all. Do data that have semi-conductor equipment or many input of LCD equipment and output node multiplex, and several units real time Ideonet communication that control is available use that all input of point of contact and output module develop.

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF